Organizations today are more susceptible to computer crime and employee fraud than ever before. This paper presents some statistics about the growth on fraud, factors which cause fraud in the workplace, how businesses can protect their assets, and common computer‐based frauds, techniques, and controls. Managers of all types of organizations need to be knowledgeable about their internal control system, and make sure it has sufficient checks and balances to ward against employees committing fraudulent acts. No organization is immune today from both external and internal threats to the safety and security of their data and information. Therefore, it is imperative that managers understand the problems that fraud can cause and how they can protect the organization.
Article navigation
1 December 1999
Literature Review|
December 01 1999
Identifying and controlling computer crime and employee fraud Available to Purchase
Susan Haugen;
Susan Haugen
University of Wisconsin‐Eau Claire, Eau Claire, Wisconsin, USA
Search for other works by this author on:
J. Roger Selin
J. Roger Selin
University of Wisconsin‐Eau Claire, Eau Claire, Wisconsin, USA
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5783
Print ISSN: 0263-5577
© MCB UP Limited
1999
Industrial Management & Data Systems (1999) 99 (8): 340–344.
Citation
Haugen S, Roger Selin J (1999), "Identifying and controlling computer crime and employee fraud". Industrial Management & Data Systems, Vol. 99 No. 8 pp. 340–344, doi: https://doi.org/10.1108/02635579910262544
Download citation file:
Suggested Reading
Watching systems in action: security at the periphery
Information Management & Computer Security (October,1998)
Auditing Personnel: : A Human Resource Approach to Information Systems Control
Managerial Auditing Journal (September,1994)
Computer Security in Large Corporations: Attitudes and Practices of CEOs
Management Decision (July,1993)
Managing and controlling computer misuse
Information Management & Computer Security (October,1999)
The 1992 Profile of Computer Abuse in Australia: Part 2
Information Management & Computer Security (February,1993)
Related Chapters
Religious Social Identity and Whistle-Blowing
Research on Professional Responsibility and Ethics in Accounting
Emotional Reactions to Financial Statement Fraud
Research on Professional Responsibility and Ethics in Accounting
Springfield Downtown, Inc.: Woman Over-Board The names of the location and the people involved in this case have been disguised; the case is based on a real occurrence.
Research on Professional Responsibility and Ethics in Accounting
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
